Sciweavers

158 search results - page 10 / 32
» Decentralizing SDN Policies
Sort
View
SP
1998
IEEE
162views Security Privacy» more  SP 1998»
15 years 2 months ago
Complete, Safe Information Flow with Decentralized Labels
The growing use of mobile code in downloaded applications and servlets has increased interest in robust mechanisms for ensuring privacy and secrecy. Information flow control is in...
Andrew C. Myers, Barbara Liskov
HICSS
2008
IEEE
164views Biometrics» more  HICSS 2008»
15 years 5 months ago
Scaling Consensus: Increasing Decentralization in Wikipedia Governance
How does “self-governance” happen in Wikipedia? Through in-depth interviews with eleven individuals who have held a variety of responsibilities in the English Wikipedia, we ob...
Andrea Forte, Amy Bruckman
PIMRC
2008
IEEE
15 years 5 months ago
A game theoretic framework for decentralized power allocation in IDMA systems
Abstract—In this contribution we present a decentralized power allocation algorithm for the uplink interleave division multiple access (IDMA) channel. Within the proposed optimal...
Samir Medina Perlaza, Laura Cottatellucci, M&eacut...
IJCAI
2007
15 years 2 days ago
Average-Reward Decentralized Markov Decision Processes
Formal analysis of decentralized decision making has become a thriving research area in recent years, producing a number of multi-agent extensions of Markov decision processes. Wh...
Marek Petrik, Shlomo Zilberstein
RBAC
1998
84views more  RBAC 1998»
15 years 3 hour ago
Decentralized User-role Assignment for Web-based Intranets
The intricacy of security administration is one of the most challenging problems in large networked systems. This problem is especially serious in the Web environment, which consi...
Ravi S. Sandhu, Joon S. Park